The alterations in glyoxylate reductase and hydroxy-pyruvate reductase concentrations in the sera and the genetic alterations associated with calcium oxalate kidney stones in Iraqi patients were not studied previously so this study aimed to focus on these points. This study included 80 subjects; they were 50 patients with calcium oxalate stones compared to 30 apparently healthy controls. Biochemical investigations for kidney functions (creatinine, urea, and uric acid), were performed on the sera of both groups. Also, complete blood count, random blood sugar, and blood group tests. Furthermore, urine had been collected for General Urine Examination to visualize oxalate crystals in the urine of the patient. Also, the GRHPR
... Show MoreHepatitis B virus (HBV) infection is a serious disease of the liver and signifies a major worldwide health concern. HBV Genotyping is vital for further epidemiological study, predicting the disease outcome and response to treatment. The current study aimed to determine hepatitis B virus genotypes in patients with chronic hepatitis B, and to validate possible associations with the baseline characteristics of the disease. A total of 90 patients with chronic hepatitis B infection were enrolled in this study. Liver function tests, hepatitis B virus markers and DNA viral load were done using routine standardized procedures. HBV genotyping was performed using real time PCR. Genotype D was the most predominant in 64 (71.1%) of samples, while
... Show MoreThe earthly music has a clear influence on the religious music in the musical culture to read and recite the Holy Quran in the city of Baghdad. This research deals with this subject in an attempt to reveal the influence of the Iraqi maqam in the recitation of Hafiz Khalil Ismail. The methodological framework of the research included the problem of research and its importance as it is useful to the Iraqi schools concerned with the recitation of the Holy Quran in Iraq. The theoretical framework included three sections that serve the literature of its subject: the first is (Iraqi maqam), the second is (the recitation of the Holy Quran) and the third is (the biography of Hafez Khalil Ismail).
The most important procedures
... Show MoreBackground: The human face has its special characteristics. It may be categorized into essentially three kinds in horizontal and vertical directions: short or brachyfacial, medium or mesofacial and long or dolichofacial. The aim of this study was to describe several orofacial indices and proportions of adults, according to gender in Iraqi subjects by using cone beam computed tomography . materials and methods: This prospective study included 100 Iraqi patients (males and females) ranging from 20 to 40 years. All subjects attended the Oral and Maxillofacial Radiology Department of Health Specialist Center for Dentistry in AL Sadr city in Baghdad taking cone beam computed tomography scan for different diagnostic purposes from October 2016 to
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe economical units in the world face great and rapid challenges in all aspects, a matter that requires facing these challenges throughout continuous improving and developing in their performance to keep their competitive position "place".
The Benchmarking Technique is one of the modern managerial tools that are proved to be successful in application throughout making continuous comparisons between products or services and the best – performance levels the compete with it . This is achieved to develop its performance and give it the competitive criterion with which it faces its competitors.
... Show More